CVE-2012-5671

Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
eximexim
4.70
eximexim
4.71
eximexim
4.72
eximexim
4.73
eximexim
4.74
eximexim
4.75
eximexim
4.76
eximexim
4.77
eximexim
4.80
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
exim4
bullseye
4.94.2-7+deb11u3
fixed
bullseye (security)
4.94.2-7+deb11u4
fixed
bookworm
4.96-15+deb12u5
fixed
bookworm (security)
4.96-15+deb12u5
fixed
sid
4.98-2
fixed
trixie
4.98-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
exim4
quantal
Fixed 4.80-3ubuntu1.1
released
precise
Fixed 4.76-3ubuntu3.1
released
oneiric
Fixed 4.76-2ubuntu1.1
released
natty
Fixed 4.74-1ubuntu1.3
released
lucid
Fixed 4.71-3ubuntu1.4
released
hardy
not-affected
References